Just a sample of the Echomail archive
[ << oldest | < older | list | newer > | newest >> ]
|  Message 8525  |
|  Michiel van der Vlist to Oli  |
|  Feature request  |
|  07 Nov 23 17:11:14  |
 
TID: FMail-W32 2.2.0.0
RFC-X-No-Archive: Yes
TZUTC: 0100
CHRS: CP850 2
MSGID: 2:280/5555 654a62a0
REPLY: 2:280/464.47 65493b7a
Hello Oli,
On Monday November 06 2023 20:16, you wrote to me:
MvdV>> - 10 May 14:46:36 [756] incoming from 2001:16d8:ff00:306::2
MvdV>> (3499) to 2001:7b8:2ff:3a9::2
MvdV>> Where 2001:7b8:2ff:3a9::2 is one of my own IP addresses, the
MvdV>> address that caller used to contact my binkd server.
[..]
Ol> A Perl hook might work. Something like:
Ol> sub on_handshake
Ol> {
Ol> Log(3,"incoming to $our_ip $our_port");
Ol> }
Hmmm... I have neve used Perl, so I would have to delve ionto that to follow
your suggestion. I am not all that eager to do that, I'd prefer a solution
that makes it an integral part of binkd. I remember someone posting the code
to do this some five years ago when I first brought it up, but I can't find it
any more... :(
Ol> * Origin: No REPLY kludge - no reply (2:280/464.47)
H‚ you stole that from me. ;-)
Cheers, Michiel
--- GoldED+/W32-MSVC 1.1.5-b20170303
* Origin: http://www.vlist.eu (2:280/5555)
SEEN-BY: 1/123 10/0 1 15/0 30/0 80/1 90/1 102/401 103/1 705 105/81
SEEN-BY: 106/201 123/131 129/305 153/7715 154/10 203/0 214/22 218/0
SEEN-BY: 218/1 215 601 700 720 820 840 860 870 880 930 221/1 6 226/30
SEEN-BY: 227/114 229/110 112 113 200 206 275 307 317 426 428 470 550
SEEN-BY: 229/664 700 240/1120 266/512 280/464 5003 5555 282/1038 291/111
SEEN-BY: 292/854 301/1 113 123 812 305/3 317/3 320/219 322/757 341/66
SEEN-BY: 342/200 396/45 460/58 633/280 712/848 5019/40 5020/1042 5053/58
SEEN-BY: 5075/35
PATH: 280/5555 301/1 218/700 229/426
|
[ << oldest | < older | list | newer > | newest >> ]